[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1501826
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:703498
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703497
linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:204477
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the ...

oval:org.secpod.oval:def:89044798
The SUSE Linux Enterprise 11 SP4 kernel was updated to fix the following security bug: CVE-2017-2636: A race condition in the n_hdlc tty Linux kernel driver could have been exploited to gain a local privilege escalation

oval:org.secpod.oval:def:89044614
The SUSE Linux Enterprise 12 kernel was updated to fix the following security bugs: - CVE-2017-7184: The Linux kernel allowed local users to obtain root privileges or cause a denial of service via unspecified vectors, as demonstrated during a Pwn2Own competition at CanSecWest 2017 . - CVE-2017-2636 ...

oval:org.secpod.oval:def:502017
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: * A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the ...

oval:org.secpod.oval:def:703501
linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703500
linux: Linux kernel - linux-raspi2: Linux kernel for Raspberry Pi 2 The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703504
linux: Linux kernel - linux-ti-omap4: Linux kernel for OMAP4 The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703496
linux: Linux kernel - linux-gke: Linux kernel for Google Container Engine systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon Processors The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:52843
linux: Linux kernel The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:52842
linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:51734
linux: Linux kernel - linux-gke: Linux kernel for Google Container Engine systems - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon Processors The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:51737
linux-hwe: Linux hardware enablement kernel for Linux Mint 18.x LTS The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:51739
linux-aws: Linux kernel for Amazon Web Services systems The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703503
linux-hwe: Linux hardware enablement kernel for Ubuntu 16.04 LTS The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:703507
linux-aws: Linux kernel for Amazon Web Services systems The system could be made to crash or run programs as an administrator.

oval:org.secpod.oval:def:204475
The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated kernel packages include several security issues and numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. To see the complete list of bug fixes, users are directed t ...

oval:org.secpod.oval:def:1501832
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1501835
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:505755
The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated kernel packages include several security issues and numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. To see the complete list of bug fixes, users are directed t ...

oval:org.secpod.oval:def:1501818
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1501821
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:602801
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or have other impacts. CVE-2016-9588 Jim Mattson discovered that the KVM implementation for Intel x86 processors does not properly handle #BP and #OF exceptions in an L2 virtu ...

oval:org.secpod.oval:def:1501819
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1501817
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1501822
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:1501820
The advisory is missing the security advisory description. For more information please visit the reference link

CWE    1
CWE-362
*CVE
CVE-2017-2636

© SecPod Technologies